Utilizing ethereum blockchain and smart contracts to transform cord blood procurement in health care supply chains

Effectively managing umbilical cord blood (CB) data involves implementing precise attention and strategic solutions within the healthcare supply chain, driving notable advancements in registration, donation, and preservation compared to regular adult blood. These challenges encompass moral, practica...

Full description

Saved in:
Bibliographic Details
Main Authors: Vinoth Kumar C, Poongundran Selvaprabhu
Format: Article
Language:English
Published: Elsevier 2025-06-01
Series:Results in Engineering
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2590123025009430
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Effectively managing umbilical cord blood (CB) data involves implementing precise attention and strategic solutions within the healthcare supply chain, driving notable advancements in registration, donation, and preservation compared to regular adult blood. These challenges encompass moral, practical, legal, and technical limitations, fostering a conducive environment for innovative thinking and progress. To ensure a fair and efficient process that improves patient experience, sustainability of the donated cord blood and trust, it is essential to have a peer-to-peer (P2P) umbilical cord blood donation management system. In this work, we propose a framework using the ethereum blockchain to facilitate decentralized, secure, traceable, auditable, accountable, transparent, and reliable management of umbilical cord blood procurement. We showcase the intricacies of our system architecture and sequence diagram, effectively illustrating the operational principles of our groundbreaking proposed solution in information management. At the core of our endeavor is the development of smart contracts, which includes the meticulous processes of algorithm generation, precise implementation, comprehensive testing, and thorough validation. Our rigorous evaluation aims to establish the superior efficacy of our proposed solution through in-depth vulnerability analyses and comprehensive comparisons with existing alternatives.
ISSN:2590-1230